Author Archive of Hackeroute

At least five firms hit by coordinated attacks earlier this month in possible retaliation for sanctions on Kremlin, Bloomberg says The hacking attacks siphoned off huge amounts of account data from JPMorgan and at least four other companies, the New York Times reported. Photograph: Spencer Platt/Getty Images The FBI is investigating a hacking attack on JPMorgan Chase and at least one other bank, according to reports. Bloomberg.com said the

Mozilla’s Firefox OS as a smartphone operating system has had a negligible impact on the market, but all that could change very soon as the first Firefox smartphone has been announced for India. The Spice Fire One has predictable low-end specifications and a greatly attractive price tag. At Mobile World Congress, Mozilla unveiled plans to expand to additional markets in Latin America and eastern Europe, and also announced a blueprint for

Today, a group of journalists has reported the existence of the "Hacienda" spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use them for their own purposes. Scientists at the Technische Universität München (TUM) have developed free software that can help prevent this kind of identification and thus the subsequent

Malicious apps are a popular way for scammers to gain control of your phone, but what about data housed within the supposedly secure apps on your device? A team of researchers from the universities of Michigan and California Riverside have found that just one malware-ridden app on a device can infiltrate other apps on the phone, regardless of their levels of security. The weakness allowed researchers to access apps like Gmail, Chase Bank, and H&R

One of the strongest weapons in a cybercriminal’s arsenal is a successful data breach from an attack on web applications. These attacks are among the most difficult to mitigate, yet the costs they incur can be far greater than the initial theft. Calculating the potential impact of a data breach is a critical component to mounting a strong defense against would-be attackers. Excerpt: “Whether your data is at risk is not the only question. You

With an aim to control and tackle cybercrime, India is planning to set up a joint portal with the US. The portal will especially deal in issues like hacking and misuse of social media platforms. Police Chief of India and the US had met in New Delhi for a two day conference regarding the issues and difficulties faced by the India Government regarding cyber crime. “We have suggested setting up of cooperation portal on cybercrime where requests

Now Learn Ethical Hacking using Backtrack Operating System. 1st time in Rajasthan This will include following topics: Course Home Part 1: Exploitation Basics Part 2: Why Metasploit Part 3: Meterpreter Basics Part 4: Framework Organization Part 5: Post Exploitation Kung-Fu Part 6: Post Exploitation Privilege Escalation Part 7: Killing AV and Disabling Firewall Part 8: Stdapi and Priv Extensions Part 9: Token Stealing and Incognito Part 10: